Dynamic Host Configuration for Managing Mobility between Public and Private Networks (2001)

Cached

Download Links

by Victor Bahl , Allen Miu , Allen Miu
Venue:In The 3rd Usenix Internet Technical Symposium
Citations:17 - 3 self

Documents Related by Co-Citation

20 Authenticating Aperiodic Connections to the Campus Network – D L Wasley - 1996
17 NetBar – Carnegie Mellon’s Solutions to Authenticated Access for – E A Napjus
15 Secure public internet access handler (spinach – Elliot Poger, Mary G. Baker - 1997
12 Component-based active network architecture – S Schmid, J Finney, A Scott, W Shepherd
79 Your 802.11 Wireless network has no clothes – William A. Arbaugh, Narendar Shankar, Y. C. Justin Wan - 2001
250 Security Architecture for the Internet – Stephen Kent, Randall Atkinson - 1988
72 Standards Committee of the IEEE Computer Society, "IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks – LAN MAN - 1998
974 Mobility support – D B Johnson, C E Perkins, J Arkko - 2004
5 Introduction to Accounting – B Aboba, J Arkko, D Harrington - 2000
210 Neighbor Discovery for – E Nordmark T Narten, H Soliman W Simpson - 2007
8 Mobile 4-in-6: A Novel Mechanism for IPv4/v6 Transitioning – J Finney, G O’Shea - 2001
5 Packet Radio Service – GPRS – Nokia’s vision for a service platform supporting packet switched applications”, White Paper – “General Nokia - 1998
21 TEA, a Tiny Encryption Algorithm. – David Wheeler, Roger Needham - 1995
63 Standards Committee of the – LAN MAN - 1999
297 Remote Authentication Dial – C Rigney, S Willens, A Rubens, W Simpson - 2000
328 HMAC: Keyed-Hashing for Message Authentication – H. Krawczyk, M. Bellare, R. Canetti - 1997
67 Unsafe at any key size; An analysis of the WEP encapsulation – Jesse R. Walker, Submission Page Jesse Walker, Intel Corporation - 2000
58 Security Architecture for the Internet – R Atkinson - 1995
16 A Peer-to-Peer Approach to Wireless LAN Roaming – Elias C. Efstathiou, George C. Polyzos - 2003